{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:16:33Z","timestamp":1764332193325},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642401756"},{"type":"electronic","value":"9783642401763"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40176-3_8","type":"book-chapter","created":{"date-parts":[[2013,7,18]],"date-time":"2013-07-18T03:54:12Z","timestamp":1374119652000},"page":"81-96","source":"Crossref","is-referenced-by-count":59,"title":["Discovering Data-Aware Declarative Process Models from Event Logs"],"prefix":"10.1007","author":[{"given":"Fabrizio Maria","family":"Maggi","sequence":"first","affiliation":[]},{"given":"Marlon","family":"Dumas","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Garc\u00eda-Ba\u00f1uelos","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Montali","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"3TU Data Center. BPI Challenge, Event Log (2011), doi: 10.4121\/uuid:d9769f3d-0ab0-4fb8-803b-0d1120ffcf54"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1186\/1471-2105-13-281","volume":"13","author":"D. Bonaki","year":"2012","unstructured":"Bonaki, D., Odenbrett, M.R., Wijs, A., Ligtenberg, W.P.A., Hilbers, P.A.J.: Efficient reconstruction of biological networks via transitive reduction on general purpose graphics processors. BMC Bioinformatics\u00a013, 281 (2012)","journal-title":"BMC Bioinformatics"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Burattin, A., Maggi, F.M., van der Aalst, W.M.P., Sperduti, A.: Techniques for a Posteriori Analysis of Declarative Processes. In: EDOC, pp. 41\u201350 (2012)","DOI":"10.1109\/EDOC.2012.15"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Chesani, F., Lamma, E., Mello, P., Montali, M., Riguzzi, F., Storari, S.: Exploiting Inductive Logic Programming Techniques for Declarative Process Mining. In: Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. LNCS, vol.\u00a05460, pp. 278\u2013295. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-00899-3_16"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-37057-1_9","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Leoni de","year":"2013","unstructured":"de Leoni, M., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L.: Discovering Branching Conditions from Business Process Execution Logs. In: Cortellessa, V., Varr\u00f3, D. (eds.) FASE 2013 (ETAPS 2013). LNCS, vol.\u00a07793, pp. 114\u2013129. Springer, Heidelberg (2013)"},{"key":"8_CR6","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-30359-3_2","volume-title":"Business Information Systems","author":"C. Ciccio Di","year":"2012","unstructured":"Di Ciccio, C., Mecella, M.: Mining constraints for artful processes. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol.\u00a0117, pp. 11\u201323. Springer, Heidelberg (2012)"},{"issue":"2","key":"8_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/32.908957","volume":"27","author":"M.D. Ernst","year":"2001","unstructured":"Ernst, M.D., Cockrell, J., Griswold, W.G., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. IEEE Trans. Software Eng.\u00a027(2), 99\u2013123 (2001)","journal-title":"IEEE Trans. Software Eng."},{"key":"8_CR8","first-page":"1305","volume":"10","author":"S. Goedertier","year":"2009","unstructured":"Goedertier, S., Martens, D., Vanthienen, J., Baesens, B.: Robust process discovery with artificial negative events. JMLR\u00a010, 1305\u20131340 (2009)","journal-title":"JMLR"},{"key":"8_CR9","unstructured":"IEEE Task Force on Process Mining. Process Mining Manifesto. In: Algebraic Semantics. LNBIP, vol.\u00a099, pp. 169\u2013194. Springer (2011)"},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/34.824819","volume":"22","author":"A.K. Jain","year":"2000","unstructured":"Jain, A.K., Duin, R.P.W., Mao, J.: Statistical pattern recognition: A review. IEEE Trans. on Pattern Analysis and Machine Intelligence\u00a022(1), 4\u201337 (2000)","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Kupferman, O., Vardi, M.Y.: Vacuity Detection in Temporal Model Checking. Int. Journal on Software Tools for Technology Transfer, 224\u2013233 (2003)","DOI":"10.1007\/s100090100062"},{"key":"8_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-78469-2_16","volume-title":"Inductive Logic Programming","author":"E. Lamma","year":"2008","unstructured":"Lamma, E., Mello, P., Riguzzi, F., Storari, S.: Applying Inductive Logic Programming to Process Mining. In: Blockeel, H., Ramon, J., Shavlik, J., Tadepalli, P. (eds.) ILP 2007. LNCS (LNAI), vol.\u00a04894, pp. 132\u2013146. Springer, Heidelberg (2008)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Lorenzoli, D., Mariani, L., Pezz\u00e8, M.: Automatic generation of software behavioral models. In: Proc. of ICSE, pp. 501\u2013510. IEEE (2008)","DOI":"10.1145\/1368088.1368157"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-31095-9_18","volume-title":"Advanced Information Systems Engineering","author":"F.M. Maggi","year":"2012","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient discovery of understandable declarative models from event logs. In: Ralyt\u00e9, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol.\u00a07328, pp. 270\u2013285. Springer, Heidelberg (2012)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-642-38709-8_28","volume-title":"Advanced Information Systems Engineering","author":"F.M. Maggi","year":"2013","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: A knowledge-based integrated approach for discovering and repairing declare maps. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol.\u00a07908, pp. 433\u2013448. Springer, Heidelberg (2013)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Maggi, F.M., Mooij, A.J., van der Aalst, W.M.P.: User-guided discovery of declarative process models. In: Proc. of CIDM, pp. 192\u2013199. IEEE (2011)","DOI":"10.1109\/CIDM.2011.5949297"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Pesic, M., Schonenberg, H., van der Aalst, W.M.P.: DECLARE: Full Support for Loosely-Structured Processes. In: Proc. of EDOC, pp. 287\u2013300. IEEE (2007)","DOI":"10.1109\/EDOC.2007.14"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M. Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.P.: A Declarative Approach for Flexible Business Processes Management. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol.\u00a04103, pp. 169\u2013180. Springer, Heidelberg (2006)"},{"key":"8_CR19","unstructured":"Pesic, M.: Constraint-Based Workflow Management Systems: Shifting Controls to Users. PhD thesis, Beta Research School for Operations Management and Logistics, Eindhoven (2008)"},{"key":"8_CR20","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-28108-2_37","volume-title":"Business Process Management Workshops","author":"P. Pichler","year":"2012","unstructured":"Pichler, P., Weber, B., Zugal, S., Pinggera, J., Mendling, J., Reijers, H.A.: Imperative versus declarative process modeling languages: An empirical investigation. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol.\u00a099, pp. 383\u2013394. Springer, Heidelberg (2012)"},{"issue":"2","key":"8_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.is.2011.01.003","volume":"37","author":"A. Rebuge","year":"2012","unstructured":"Rebuge, A., Ferreira, D.R.: Business process analysis in healthcare environments: A methodology based on process mining. Inf. Syst.\u00a037(2), 99\u2013116 (2012)","journal-title":"Inf. Syst."},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11841760_33","volume-title":"Business Process Management","author":"A. Rozinat","year":"2006","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Decision mining in ProM. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol.\u00a04102, pp. 420\u2013425. Springer, Heidelberg (2006)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P., Pesic, M., Schonenberg, H.: Declarative Workflows: Balancing Between Flexibility and Support. Computer Science - R&D, 99\u2013113 (2009)","DOI":"10.1007\/s00450-009-0057-9"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Zugal, S., Pinggera, J., Weber, B.: The impact of testcases on the maintainability of declarative process models. In: BMMDS\/EMMSAD, pp. 163\u2013177 (2011)","DOI":"10.1007\/978-3-642-21759-3_12"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40176-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T00:05:11Z","timestamp":1557965111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40176-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642401756","9783642401763"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40176-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}